{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T14:33:51Z","timestamp":1764858831417,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,4]],"date-time":"2015-10-04T00:00:00Z","timestamp":1443916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation Award","award":["CSR-1464438 (CRII)"],"award-info":[{"award-number":["CSR-1464438 (CRII)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,4]]},"DOI":"10.1145\/2815400.2815426","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T12:01:58Z","timestamp":1443700918000},"page":"295-310","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["Existential consistency"],"prefix":"10.1145","author":[{"given":"Haonan","family":"Lu","sequence":"first","affiliation":[{"name":"University of Southern California and Facebook, Inc."}]},{"given":"Kaushik","family":"Veeraraghavan","sequence":"additional","affiliation":[{"name":"Facebook, Inc."}]},{"given":"Philippe","family":"Ajoux","sequence":"additional","affiliation":[{"name":"Facebook, Inc."}]},{"given":"Jim","family":"Hunt","sequence":"additional","affiliation":[{"name":"Facebook, Inc."}]},{"given":"Yee Jiun","family":"Song","sequence":"additional","affiliation":[{"name":"Facebook, Inc."}]},{"given":"Wendy","family":"Tobagus","sequence":"additional","affiliation":[{"name":"Facebook, Inc."}]},{"given":"Sanjeev","family":"Kumar","sequence":"additional","affiliation":[{"name":"Facebook, Inc."}]},{"given":"Wyatt","family":"Lloyd","sequence":"additional","affiliation":[{"name":"University of Southern California and Facebook, Inc."}]}],"member":"320","published-online":{"date-parts":[[2015,10,4]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01784241"},{"volume-title":"HotOS","year":"2015","author":"Ajoux P.","key":"e_1_3_2_2_2_1"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465361"},{"volume-title":"What consistency does your key-value store actually provide? In HotDep","year":"2010","author":"Anderson E.","key":"e_1_3_2_2_4_1"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/176575.176576"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588562"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465279"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/2212351.2212359"},{"volume-title":"CIDR","year":"2011","author":"Baker J.","key":"e_1_3_2_2_9_1"},{"volume-title":"CIDR","year":"2013","author":"Barahmand S.","key":"e_1_3_2_2_10_1"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/568271.223785"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/356842.356846"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/343477.343502"},{"volume-title":"USENIX ATC","year":"2013","author":"Bronson N.","key":"e_1_3_2_2_14_1"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1365815.1365816"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454167"},{"volume-title":"OSDI","year":"2012","author":"Corbett J. C.","key":"e_1_3_2_2_17_1"},{"volume-title":"USENIX ATC","year":"2012","author":"Cowling J.","key":"e_1_3_2_2_18_1"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294281"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2014.6818330"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523628"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2670983"},{"volume-title":"SIGCOMM","year":"2012","author":"Escriva R.","key":"e_1_3_2_2_23_1"},{"key":"e_1_3_2_2_24_1","unstructured":"Fitzpatrick B. Memcached: a distributed memory object caching system. http:\/\/memcached.org\/ 2014.  Fitzpatrick B. Memcached: a distributed memory object caching system. http:\/\/memcached.org\/ 2014."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043559"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.57"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673882"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465363"},{"volume-title":"LADIS (Oct.","year":"2009","author":"Lakshman A.","key":"e_1_3_2_2_32_1"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675439"},{"volume-title":"On interprocess communication. Part I: Basic formalism and Part II: Algorithms. Distributed Computing","year":"1986","author":"Lamport L.","key":"e_1_3_2_2_35_1"},{"volume-title":"OSDI","year":"2012","author":"Li C.","key":"e_1_3_2_2_36_1"},{"volume-title":"PRAM: A scalable shared memory","year":"1988","author":"Lipton R. J.","key":"e_1_3_2_2_37_1"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043593"},{"volume-title":"NSDI","year":"2013","author":"Lloyd W.","key":"e_1_3_2_2_39_1"},{"volume-title":"Network time protocol version 4: Protocol and algorithms specification. Internet Engineering Task Force (IETF)","year":"2010","author":"Mills D.","key":"e_1_3_2_2_40_1"},{"volume-title":"OSDI","year":"2014","author":"Mu S.","key":"e_1_3_2_2_41_1"},{"volume-title":"NSDI","year":"2013","author":"Nishtala R.","key":"e_1_3_2_2_42_1"},{"volume-title":"The case for RAMCloud. ACM SIGOPS Operating Systems Review","year":"2010","author":"Ousterhout J.","key":"e_1_3_2_2_43_1"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/322154.322158"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038925"},{"key":"e_1_3_2_2_46_1","unstructured":"http:\/\/project-voldemort.com\/ 2011.  http:\/\/project-voldemort.com\/ 2011."},{"volume-title":"HotDep","year":"2012","author":"Rahman M. R.","key":"e_1_3_2_2_47_1"},{"volume-title":"NSDI (May","year":"2015","author":"Sharma Y.","key":"e_1_3_2_2_48_1"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213954"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043592"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522731"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213838"},{"volume-title":"CIDR","year":"2011","author":"Wada H.","key":"e_1_3_2_2_53_1"},{"volume-title":"OSDI","year":"2014","author":"Xie C.","key":"e_1_3_2_2_54_1"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2391229.2391235"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522729"}],"event":{"name":"SOSP '15: ACM SIGOPS 25th Symposium on Operating Systems Principles","sponsor":["SSRC Storage Systems Research Center, UC Santa Cruz","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Monterey California","acronym":"SOSP '15"},"container-title":["Proceedings of the 25th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815400.2815426","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815400.2815426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:13Z","timestamp":1750225393000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815400.2815426"}},"subtitle":["measuring and understanding consistency at Facebook"],"short-title":[],"issued":{"date-parts":[[2015,10,4]]},"references-count":55,"alternative-id":["10.1145\/2815400.2815426","10.1145\/2815400"],"URL":"https:\/\/doi.org\/10.1145\/2815400.2815426","relation":{},"subject":[],"published":{"date-parts":[[2015,10,4]]},"assertion":[{"value":"2015-10-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}